The dropped kernel extension is also detected by Trend Micro as OSX_MORCUT.A. It is used by this malware to hide its created folders and its process.

This backdoor runs on the following OS X platforms:

10.5 (Leopard)

10.6 (Snow Leopard)

10.7 (Lion)

SOLUTION

Minimum Scan Engine:

9.200

VSAPI OPR PATTERN File:

9.285.00

VSAPI OPR PATTERN Date:

26 Jul 2012

NOTES:

AUTOMATIC REMOVAL INSTRUCTIONS

To automatically remove this malware from your system, use Trend Micro's special fixtool. Download, extract, and run the said fixtool in the same folder where your latest Trend Micro pattern file is located. For more details, refer to the fixtool's incorporated text file.

MANUAL REMOVAL INSTRUCTIONS

Step 1

Delete files dropped by this malware. To delete the autostart file, open a Terminal window and type the following command:

"rm /Library/LaunchAgents/com.apple.mdworker.plist"

"rm /Users/{user name}/Library/LaunchAgents/com.apple.mdworker.plis"

Step 2

Restart your computer.

Step 3

Deleting the malware folder. To delete the malware folder, navigate to the following folders in Finder:

/Library/ScriptingAdditions/appleHID

/Users/{user name}/Library/ScriptingAdditions/appleHID

Drag each folder to the Trash. Empty the Trash.

Step 4

Scan your computer with your Trend Micro product to delete files detected as OSX_MORCUT.A. If the detected files have already been cleaned, deleted, or quarantined by your Trend Micro product, no further step is required. You may opt to simply delete the quarantined files. Please check this Knowledge Base page for more information.